Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230621-es -
resource tags
arch:x64arch:x86image:win7-20230621-eslocale:es-esos:windows7-x64systemwindows -
submitted
28/06/2023, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.exe
Resource
win7-20230621-es
Behavioral task
behavioral2
Sample
TLauncher.exe
Resource
win10v2004-20230621-es
General
-
Target
TLauncher.exe
-
Size
6.3MB
-
MD5
a09d58d5281883d9b555cb8f99974f57
-
SHA1
f900108770e0ee69a88df27bfeb3aa13322385b0
-
SHA256
dd5891adfd1f98f945cd02c02a231a41c8224ccc350050b65e2b987e075920aa
-
SHA512
0f9fc01df7bd6fcf25893ef1a31d0105e19a853d81d475312c1ad4d3f17b77ad6cba659c4b78bda8040279c91947d9277987447a3795b7acb393a5eb95ae8f3c
-
SSDEEP
196608:kF52l8bIboBT5eN0Ca/TuQnxByJRHcj3pqxsY:hRNNG/TuoyJRui
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f3ac9360a9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000826db13b4f2d6946b52cb68ee9de0a2e0000000002000000000010660000000100002000000054755160bc5f1625762b51c62f0748be41c8cf8249b316ba088842886bf27839000000000e80000000020000200000009b77f9f63fd5a2a2e3eca32a0f6c94687c38aa57fad63c6ca5eb3b75c0db04669000000013fbf92ba9108aeb24876fcbaa7aabb14815d5924c9b585ab2a5b33c0fb63a9a867610792cda8a648461d33e1bb3575b39104bb8890fadf59b3501aa85fe21ac1144574cf488510c93ac3211658c02c5c684947886ca9e452288264bb41469fa6c2d8e5f617f1fc7012187c60119e8f50c8e3ff7ac3d9e5d4687d0128206901d430acf21c3f1a3eb435b312cbd46195140000000713edc9ad5074db507e028ff4f5c4eef0a25fcef157f9b19584a4d949004d517303860b7f3ec61c8ccc4489e99342101c61b98d8180e246f7e911fe421ac2e2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\es-ES = "es-ES.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394680954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6C431A1-1553-11EE-9729-465D40D99EC7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000826db13b4f2d6946b52cb68ee9de0a2e00000000020000000000106600000001000020000000af6032b1f053e11986cd621ee2bbd69366b46563925145c2cd5baf8b7483cb97000000000e8000000002000020000000ae9abc6f9da402b199c1c8378970accf2b991408303c20e4f847085df198769d20000000474d005ddbce636385648d5e24f448ef19fcb0d5520ba1ad51062c60fdae95e1400000000101017b4908ecc58db5a0018b5185445136d3a5a8175740b007371035d7b593cbd978af18bc4b2c47d97fe8ad74bbffc41a78234daade7f8db4caff7cbbf1ae iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1264 1424 TLauncher.exe 28 PID 1424 wrote to memory of 1264 1424 TLauncher.exe 28 PID 1424 wrote to memory of 1264 1424 TLauncher.exe 28 PID 1424 wrote to memory of 1264 1424 TLauncher.exe 28 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30 PID 1264 wrote to memory of 1736 1264 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5382d64aaab63b97d95540a48133177b9
SHA127299729ce298abb420753afa8fde2dec361e3dc
SHA2566532d23c5ae5ae76290d9f2eb25e5b350ae4112e7f7022f069807d310c45d335
SHA512a47d906c6e2142b0001284fff1ef2a38cb96fb24377f06d68777ffb768363365ce7feb929748f7a31a7cdc3a4ee9b9c9f1d76a08bc9bf40f1fb8ac61a4494223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da406c297d82cfb186a0ed235fbf28f6
SHA18092e10a3ac0bc947efc24e4acb2e3498825b428
SHA2561cff0fe7c0c741f9ec49e9e0d771ca39826ed92b6555ed7cd58b21d9e321de60
SHA512eba2493f1083691d054ea98a48f406a1f470dfba0592abf0d7038ed9ef3d6959843edb115b31d9d9a9971613eebd7f81c5c9249302487443c79fbb03667e8ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c7a591539acbd91848b56dde538cd57
SHA13eb6a9c24ac1b6c1509daf41c632f02f06b5cef5
SHA2562b0f7d28e8ef72a394a73b8cfeb96b43f8dc5ea1c0b8415fb6547cf1132fa79e
SHA512ff7bd83bd9be24b4129209745c9e003c581ff6b645c067087a4569e351003c0cffeffcbe0bf90fd9c1987bfb340167f733362ac5ee9d90680729e847116e998f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503e4e1dde8460f1272f6dc6c36638a37
SHA18c4dff6b5705f620467e08a4ade9c6d59f9a7df2
SHA256ea1c8a63afc5d1631c12e3edb1cdce3445204db97f177a3ca11b9bf9369e07eb
SHA512a3acd86a7124fa023b56d76beadba3559b328cbf9e713a351165b3605f2589b2345f94458fd5e7f3243e342604aeeca7ddff381388e49c4654d1ed977677438e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a69879059720bfb8362db31c48be1ab
SHA17bde2589b132c713236ca7f36edfc3eca8bd260c
SHA25624a2907c980f342135589b930777098789b4884fedea064983baad5f33beabfe
SHA5127a54add6822ae2d1bf4583bf6a326dc339fdc039be26adbc99807c5ec1b3792e42dac47b8285ce97ab8dd41dbd2d2ce37932750fd9755da711cd941f9666ec1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee75e9265f9592cac4a3b2156c700214
SHA1f312ccdeb594841fd08fa21549f71594b09f42bd
SHA2567230ada041db5a7850dbe8d1a7c3467e3f874437f6327887ef8988a2295b573f
SHA512abbf5974438388ae0e7d5de107141e82c624e0ae975dff099b3a8e2537c000946d3759312b3d2481bb1d647de03e143fac8fa16b00727f954d0ac6e6db59739c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeaa3977d57753cb55b039f2aeaa546a
SHA1fdb9674c48c92d6e4aa5222e894fba96dd3bc7bb
SHA256e700e0db588221728186767b36e39d5724f27eab14534175aa25f6767f56a03d
SHA512c4ae4daa6ca722eb06ce87cc39b234d156c412c325de3743e11b52255a2001824c5bec57ae24558df89abc9f52ab6be9c2c0b4839471e18314a2ac7ba4da3813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6ab161b22848ba0a3795d6b437295f
SHA14a35d595909845fa03eae36c6ab1bf6d06f47715
SHA2564b57201a066e1af37c6a60040f0012ba47fe399beda3723676f3d35b7fb06e7f
SHA512d167b28d2045e3e2e8afb830e4ebe0b7d0c789be6f0aafa27796a13c47721ba78a470af8b5a22cce78360c25f1c2834e1a0312e31e3937a10134eedc7ee224af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e08ad5b928824de888ab1a63cc0859f
SHA1f4c622f019bd5169129f2aa0705077ac21ddaf98
SHA2569e0af78f4b47dce6ce413e4ecd2f0c802fef85a2ac1938c512ff22a1b0bafa1d
SHA512e8b5e736478f7aa1c8e562e83138f526c4ee3eb8ef7d7e7f17952ef8eda78cd4f20257a1fe5c48939230ebd576dc303551048c82ab2c1df57c6e9e95eb009592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be90b53c0be0bacceffde017b2611746
SHA1c835d91cf9a28e5b2898d7ddddee04009f135b62
SHA25649ba33503e39ae3083fd4bb6cd38a6dfb29eb1f30025a8b6f4755c2dff9eabfd
SHA512db510eac153a13e1efc9fdc0c71cc965f3cbf92798eef21baecf1b87f1456f75719c1d9b1e512da9a8ce9e0962d1c309c7ade98e02720f9adcd63d308728b772
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\134K02XQ\suggestions[1].es-ES
Filesize18KB
MD5e2749896090665aeb9b29bce1a591a75
SHA159e05283e04c6c0252d2b75d5141ba62d73e9df9
SHA256d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7
SHA512c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD5f3dfdc6ca00f5386c57cad5e1fb7267b
SHA13ce3157c92c0842d0082ad0ae9ac48eb69e27e3d
SHA256336fef29b3b4b97a23cbc20bf0ae51588a891300f0ef04b37918998811f609d1
SHA5120837dd3d370baabdec851c7be34c9cc4b6ab187c6aa388e50d5e41be6661bc5a16f2829099c4e137529c649268d869c284379d3471b23bdf934178fbe3eac133